SlideShare a Scribd company logo
IPv6
Presented by:
Maryam Asghar BTS 43
Hamza Tareen BTS 31
Ahsan Mirza BTS 30
Arsalan BTS 49
Ali Hassan BTS 14-29
The Need for IPv6
• IPv6 has a larger 128-bit address space,
providing
(340,282,366,920,938,463,463,374,607,431,76
8,211,456 to be exact) addresses. This
provides roughly 50 octillion addresses per
person alive on Earth today, or roughly 3.7 x
1021 addresses per square inch of the Earth’s
surface.
• A lack of Internet addresses caused web
programmes slow down.
• To allow the Internet to continue to grow and
spread across the world, implementing IPv6 is
necessary.
The Need for IPv6
• The depletion of IPv4 address space
has been the motivating factor for
moving to IPv6
• IPv4 has a theoretical maximum of 4.3
billion addresses. With an increasing
Internet population, a limited IPv4
address space, issues with NAT and an
Internet of Everything.
• The time has come to begin the
transition to IPv6.
IPv4 and IPv6 Coexistence
• There is not a single date to move to IPv6. For the
future, both IPv4 and IPv6 will coexist. The IETF has
created various protocols and tools to help
network administrators migrate their networks to
IPv6. The migration techniques can be divided into
three categories:
• Dual Stack –A station must run IPv4 and IPv6
simultaneously until all the Internet uses IPv6. To
determine which version to use when sending a
packet to a destination to the source host queries
the DNS. If the DNS return an IPv4 address, the
source host sends an IPv4 packet. If the DNS return
an IPv6 address, the source host sends an IPv6
packet.
IPv4 and IPv6 Coexistence
• Tunneling: is a strategy used when two computer
using IPv6 want to communicate with each other and
the packet must pass through a region that uses an
IPv4. To pass through this region the packet must
have an IPv4 address. So the IPv6 packet is
encapsulated in IPv4 packet when it enters the
region, and it leaves its capsule when it exits the
region. It seems as if the IPv6 packet enters the
tunnel at one end and emerges at other end.
• Header Translation: sender wants to use Ipv6 but the
receiver does not understand Ipv6
• Tunneling does not worked
• Must Ipv4 format to understood
• Header format totally changed
Benefits of IPv6
IPv6 offers the following features:
• Increased Address Space and
Scalability – providing the absurd
number of possible addresses stated
previously.
• Integrated Security – provides built-in
authentication and encryption into the
IPv6 network header
• Compatibility with IPv4 – simplifies
address migration, as IPv6 is backward-
compatible with IPv4
IPv6 Address Representation
• An IPv6 address is represented as eight
groups of four hexadecimal digits, each
group representing 16 bits (two octets, a
group sometimes also called a hextet). The
groups are separated by colons (:).
• 2001:0db8:85a3:0000:0000:8a2e:0370:7334
• The hexadecimal digits are case-insensitive.
• The full representation of IPv6 have
following techniques;
• Leading zeroes in a group may be omitted,
but each group must retain at least one
hexadecimal digit.
• Thus, the example address may be written
as: 2001:db8:85a3:0:0:8a2e:370:7334
IPv6 Address Representation(cont.)
• One or more consecutive groups of zero
value may be replaced with a single
empty group using two consecutive
colons (::)
• but the substitution may only be applied
once in the address, because multiple
occurrences would create an ambiguous
representation.
• For example
2001:0db8:85a3:0000:0000:8a2e:0370:7334
can be written as
2001:db8:85a3::8a2e:370:7334
What happened to IPv5?
• Version 5 of the IP family was an
experimental protocol developed in the
1980s. IPv5 (also called the Internet
Stream Protocol) was never widely
deployed.
• Since the number 5 was already
allocated, this number was not
considered for the successor to IPv4.
• Several proposals were suggested as the
IPv4 successor, and each was assigned a
number. In the end, it happened that the
one with version number 6 was selected.
IPv6 Address Types
• Unicast - An IPv6 unicast address
uniquely identifies an interface on an
IPv6-enabled device
• Multicast - An IPv6 multicast address is
used to send a single IPv6 packet to
multiple destinations.
• Anycast - An IPv6 anycast address is any
IPv6 unicast address that can be assigned
to multiple devices. A packet sent to an
anycast address is routed to the nearest
device having that address.
World IPv6 Day and World IPv6 Launch Day
• World IPv6 Day was a technical testing and
publicity event in 2011 sponsored and organized
by the Internet Society and several large Internet
content services to test and promote public IPv6
deployment.
• Following the success of the 2011 test day, the
Internet Society carried out a World IPv6
Launch day on June 6, 2012 which, instead of
just a test day, was planned to permanently
enable IPv6 for the products and services of the
participants
• Up till now 20 % of IPv6 has been deployed in
the world and might be possible world will
transit to IPv6 in early 2020 due to shortage of
IPv4.
The IPv6 Prefix
• IPv4 utilizes a subnet mask to define the
network “prefix” and “host” portions of
an address.
• IPv6 always use CIDR notation to
determine what bits notate the prefix of
an address:
• Full Address:
1254:1532:26B1:CC14:123:1111:2222:3333/64
Prefix ID: 1254:1532:26B1:CC14:
Host ID: 123:1111:2222:3333
• The /64 indicates that the first 64 bits of
this address identify the prefix.
Thank You (;

More Related Content

What's hot

BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
Achmad Mardiansyah
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
Aruba, a Hewlett Packard Enterprise company
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
ISMT College
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
SagarR24
 
Kamailio - SIP Routing in Lua
Kamailio - SIP Routing in LuaKamailio - SIP Routing in Lua
Kamailio - SIP Routing in Lua
Daniel-Constantin Mierla
 
Overview of the ARC Protocol for Email
Overview of the ARC Protocol for EmailOverview of the ARC Protocol for Email
Overview of the ARC Protocol for Email
Steve Jones
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
APNIC
 
Wireshark
Wireshark Wireshark
Wireshark
antivirusspam
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
ShortestPathFirst
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
Babak Farrokhi
 
netfilter and iptables
netfilter and iptablesnetfilter and iptables
netfilter and iptables
Kernel TLV
 
Wireshark
WiresharkWireshark
Wireshark
lakshya dubey
 
Introduction to BRAS
Introduction to BRASIntroduction to BRAS
Introduction to BRAS
KHNOG
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
Yaser Rahmati
 
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with MikrotikNetwork LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
GLC Networks
 
Port Security
Port SecurityPort Security
Port Security
NetProtocol Xpert
 
Ipv6
Ipv6Ipv6

What's hot (20)

BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
Kamailio - SIP Routing in Lua
Kamailio - SIP Routing in LuaKamailio - SIP Routing in Lua
Kamailio - SIP Routing in Lua
 
Overview of the ARC Protocol for Email
Overview of the ARC Protocol for EmailOverview of the ARC Protocol for Email
Overview of the ARC Protocol for Email
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
 
Wireshark
Wireshark Wireshark
Wireshark
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
 
netfilter and iptables
netfilter and iptablesnetfilter and iptables
netfilter and iptables
 
Wireshark
WiresharkWireshark
Wireshark
 
Introduction to BRAS
Introduction to BRASIntroduction to BRAS
Introduction to BRAS
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with MikrotikNetwork LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
 
Port Security
Port SecurityPort Security
Port Security
 
Ipv6
Ipv6Ipv6
Ipv6
 

Similar to Ipv6 presentation

A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
Syed Arshad
 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6
Zalak Patel
 
An IPv6 Primer
An IPv6 PrimerAn IPv6 Primer
An IPv6 Primer
Carlos Martinez Cagnazzo
 
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfResearch the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
arcotstarsports
 
Getting The World IPv6 Enabled
Getting The World IPv6 EnabledGetting The World IPv6 Enabled
Getting The World IPv6 Enabled
IPv6 Forum Singapore
 
PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006 PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006
Pace IT at Edmonds Community College
 
IPv6 The Big Move Transition And Coexistent
IPv6 The Big Move Transition And CoexistentIPv6 The Big Move Transition And Coexistent
IPv6 The Big Move Transition And Coexistent
frenildand
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
Carrie Romero
 
Ipv6 routing
Ipv6 routingIpv6 routing
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
srmanjuskp
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
Subrata Kumer Paul
 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6
liiramlkprov
 
Ventajas de IPv6
Ventajas de IPv6Ventajas de IPv6
Ventajas de IPv6
Eduardo Castro
 
Ipv6
Ipv6Ipv6
IPv6
IPv6IPv6
Introduction of ipv6
Introduction of ipv6Introduction of ipv6
Introduction of ipv6
KaushikMajumder22
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
Network Utility Force
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
Mani Singh
 
IPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-onIPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-on
APNIC
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
Karunakant Rai
 

Similar to Ipv6 presentation (20)

A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6
 
An IPv6 Primer
An IPv6 PrimerAn IPv6 Primer
An IPv6 Primer
 
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfResearch the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
 
Getting The World IPv6 Enabled
Getting The World IPv6 EnabledGetting The World IPv6 Enabled
Getting The World IPv6 Enabled
 
PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006 PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006
 
IPv6 The Big Move Transition And Coexistent
IPv6 The Big Move Transition And CoexistentIPv6 The Big Move Transition And Coexistent
IPv6 The Big Move Transition And Coexistent
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
 
Ipv6 routing
Ipv6 routingIpv6 routing
Ipv6 routing
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6
 
Ventajas de IPv6
Ventajas de IPv6Ventajas de IPv6
Ventajas de IPv6
 
Ipv6
Ipv6Ipv6
Ipv6
 
IPv6
IPv6IPv6
IPv6
 
Introduction of ipv6
Introduction of ipv6Introduction of ipv6
Introduction of ipv6
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
IPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-onIPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-on
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Ipv6 presentation

  • 1. IPv6 Presented by: Maryam Asghar BTS 43 Hamza Tareen BTS 31 Ahsan Mirza BTS 30 Arsalan BTS 49 Ali Hassan BTS 14-29
  • 2. The Need for IPv6 • IPv6 has a larger 128-bit address space, providing (340,282,366,920,938,463,463,374,607,431,76 8,211,456 to be exact) addresses. This provides roughly 50 octillion addresses per person alive on Earth today, or roughly 3.7 x 1021 addresses per square inch of the Earth’s surface. • A lack of Internet addresses caused web programmes slow down. • To allow the Internet to continue to grow and spread across the world, implementing IPv6 is necessary.
  • 3. The Need for IPv6 • The depletion of IPv4 address space has been the motivating factor for moving to IPv6 • IPv4 has a theoretical maximum of 4.3 billion addresses. With an increasing Internet population, a limited IPv4 address space, issues with NAT and an Internet of Everything. • The time has come to begin the transition to IPv6.
  • 4. IPv4 and IPv6 Coexistence • There is not a single date to move to IPv6. For the future, both IPv4 and IPv6 will coexist. The IETF has created various protocols and tools to help network administrators migrate their networks to IPv6. The migration techniques can be divided into three categories: • Dual Stack –A station must run IPv4 and IPv6 simultaneously until all the Internet uses IPv6. To determine which version to use when sending a packet to a destination to the source host queries the DNS. If the DNS return an IPv4 address, the source host sends an IPv4 packet. If the DNS return an IPv6 address, the source host sends an IPv6 packet.
  • 5. IPv4 and IPv6 Coexistence • Tunneling: is a strategy used when two computer using IPv6 want to communicate with each other and the packet must pass through a region that uses an IPv4. To pass through this region the packet must have an IPv4 address. So the IPv6 packet is encapsulated in IPv4 packet when it enters the region, and it leaves its capsule when it exits the region. It seems as if the IPv6 packet enters the tunnel at one end and emerges at other end. • Header Translation: sender wants to use Ipv6 but the receiver does not understand Ipv6 • Tunneling does not worked • Must Ipv4 format to understood • Header format totally changed
  • 6. Benefits of IPv6 IPv6 offers the following features: • Increased Address Space and Scalability – providing the absurd number of possible addresses stated previously. • Integrated Security – provides built-in authentication and encryption into the IPv6 network header • Compatibility with IPv4 – simplifies address migration, as IPv6 is backward- compatible with IPv4
  • 7. IPv6 Address Representation • An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets, a group sometimes also called a hextet). The groups are separated by colons (:). • 2001:0db8:85a3:0000:0000:8a2e:0370:7334 • The hexadecimal digits are case-insensitive. • The full representation of IPv6 have following techniques; • Leading zeroes in a group may be omitted, but each group must retain at least one hexadecimal digit. • Thus, the example address may be written as: 2001:db8:85a3:0:0:8a2e:370:7334
  • 8. IPv6 Address Representation(cont.) • One or more consecutive groups of zero value may be replaced with a single empty group using two consecutive colons (::) • but the substitution may only be applied once in the address, because multiple occurrences would create an ambiguous representation. • For example 2001:0db8:85a3:0000:0000:8a2e:0370:7334 can be written as 2001:db8:85a3::8a2e:370:7334
  • 9. What happened to IPv5? • Version 5 of the IP family was an experimental protocol developed in the 1980s. IPv5 (also called the Internet Stream Protocol) was never widely deployed. • Since the number 5 was already allocated, this number was not considered for the successor to IPv4. • Several proposals were suggested as the IPv4 successor, and each was assigned a number. In the end, it happened that the one with version number 6 was selected.
  • 10. IPv6 Address Types • Unicast - An IPv6 unicast address uniquely identifies an interface on an IPv6-enabled device • Multicast - An IPv6 multicast address is used to send a single IPv6 packet to multiple destinations. • Anycast - An IPv6 anycast address is any IPv6 unicast address that can be assigned to multiple devices. A packet sent to an anycast address is routed to the nearest device having that address.
  • 11. World IPv6 Day and World IPv6 Launch Day • World IPv6 Day was a technical testing and publicity event in 2011 sponsored and organized by the Internet Society and several large Internet content services to test and promote public IPv6 deployment. • Following the success of the 2011 test day, the Internet Society carried out a World IPv6 Launch day on June 6, 2012 which, instead of just a test day, was planned to permanently enable IPv6 for the products and services of the participants • Up till now 20 % of IPv6 has been deployed in the world and might be possible world will transit to IPv6 in early 2020 due to shortage of IPv4.
  • 12. The IPv6 Prefix • IPv4 utilizes a subnet mask to define the network “prefix” and “host” portions of an address. • IPv6 always use CIDR notation to determine what bits notate the prefix of an address: • Full Address: 1254:1532:26B1:CC14:123:1111:2222:3333/64 Prefix ID: 1254:1532:26B1:CC14: Host ID: 123:1111:2222:3333 • The /64 indicates that the first 64 bits of this address identify the prefix.

Editor's Notes

  1. An IP address is essentially a postal address for each and every Internet-connected device. Without one, websites would not know where to send the information each time you perform a search or try to access a website. The world officially ran out of the 4.3 billion available IPv4 addresses in February 2011. Yet, hundreds of millions of people are still to come online, many of whom will do so in the next few years. IPv6 is what will allow them to come online, providing enough addresses (2128 to be exact) for everyone and all of their various devices. A lack of Internet addresses would have caused many problems; your favorite web programmes would slow down, computers would find it more difficult to communicate with one another, and your privacy could be compromised because it will be hard to tell the difference between you and another computer user down the street. To allow the Internet to continue to grow and spread across the world, implementing IPv6 is necessary.
  2. Allowance for extension Support for mobility Support for better security Zayn aik lazy banda hy usy us ki mama ny bola ja k motor on krdo Wo betha soch rha hy k mai ni ja rha same isi trha internt of everything humain is chez ki facility dyta hay k hum apny electric devices ko ip assign kr skty hain lekin ipv4 hmari ye need poori ni krta or Internet of everything k liay humain Ipv6 ki zrort hy ta k hum hr kisi device ko ip assign kr sakain or us device ko apny mobile device ya kisi b electronic devices mai app ya web application k through hum usy control ker skty hain.
  3. International Engeneering task force Dual stack: A station must run IPv4 and IPv6 simultaneously until all the Internet uses IPv6. To determine which version to use when sending a packet to a destination to the source host queries the DNS. If the DNS return an IPv4 address, the source host sends an IPv4 packet. If the DNS return an IPv6 address, the source host sends an IPv6 packet. Network Address Translation protocol Tunneling: is a strategy used when two computer using IPv6 want to communicate with each other and the packet must pass through a region that uses an IPv4. To pass through this region the packet must have an IPv4 address. So the IPv6 packet is encapsulated in IPv4 packet when it enters the region, and it leaves its capsule when it exits the region. It seems as if the IPv6 packet enters the tunnel at one end and emerges at other end. Header Translation: sender wants to use Ipv6 but the receiver does not understand Ipv6 > Tunneling does not worked > Must Ipv4 format to understood > Header format totally changed
  4. Automatic configuration: IPv6 hosts can automatically configure their own IPv6 addresses and other configuration parameters, even in the absence of an address configuration infrastructure such as DHCP. No more NAT (Network Address Translation) Auto-configuration No more private address collisions Better multicast routing Simpler header format Simplified, more efficient routing True quality of service (QoS), also called "flow labeling" Built-in authentication and privacy support Flexible options and extensions Easier administration (say good-bye to DHCP) Security - Built-in, strong IP-layer encryption and authentication Mobility - More efficient and robust mechanisms Mobile hosts have one or more home address relatively stable; associated with host name in DNS A Host will acquire a care-of address when it discovers it is in a foreign subnet (i.e., not its home subnet) uses auto-configuration or local policy to get the address registers the care-of address with a home agent, i.e, a router on its home subnet Packets sent to the mobile’s home address(es) are intercepted by home agent and forwarded to the care-of address, using encapsulation Mobile IPv6 hosts sends binding-updates to correspondent to remove home agent from flow Quality of Service Privacy Extensions for Stateless Address Autoconfiguration (RFC 3041) Source address selection
  5. Internet stream protocol was never used by public it was only for experimenta;l purposes Due to different flaws it was never introduced .
  6. What is Unicast? Unicast is a type of communication where data is sent from one computer to another computer. Unicast is a one-to-one type of network communication. Different data streams are generated for each Unicast connection. This type of communication is the option when clients need different data from network server. In Unicast type of communication, there is only one sender, and only one receiver. Example for IPv6 Unicast type of network communication: 1) Browsing a website. (Webserver is the sender and your computer is the receiver.) 2) Downloading a file from a FTP Server. (FTP Server is the sender and your computer is the receiver.) What is Multicast? Multicast is a type of communication where multicast traffic addressed for a group of devices on the network. IPv6 multicast traffic are sent to a group and only members of that group receive the Multicast traffic. Devices which are interested in a particular Multicast traffic must join to that Multicast group to receive the traffic.IPv6 Multicast Groups are identified by IPv6 Multicast Addresses. In Multicast, the sender transmit only one copy of data and it is delivered to many devices (Not all devices as inIPv4 Broadcast) who are interested in that traffic. What is Anycast? Anycast is a type of IPv6 network communication in which IPv6 datagrams from a source are routed to the nearest device (in terms of routing distance) from a group servers which provide the same service. Every nodes which provide the same service are configured with same Anycast destination address. Refer the above image. Here we have three servers providing the same network service, but located at different routing distances from the source network. With the help of routing protocols, IPv6 Anycast network communication can identify the near node from a group of server nodes, which provides the same service and avail the service from the near server
  7. World IPv6 Day was announced on January 12, 2011 with five anchoring companies: Facebook, Google, Yahoo, Akamai Technologies, and Limelight Networks.[3] The event started at 00:00 UTC on June 8, 2011 and ended 23:59 the same day he main motivation for the event was to evaluate the real world effects of the IPv6 brokenness as seen by various synthetic tests. To this end, during World IPv6 Day major web companies and other industry players enabled IPv6 on their main websites for 24 hours. An additional goal was to motivate organizations across the industry – Internet service providers, hardware makers, operating system vendors and web companies – to prepare their services for IPv6, so as to ensure a successful transition from IPv4 as address space runs out[ here were more than 400 participants in the original World IPv6 Day.[8] included some of the most heavily accessed destinations on the Internet, content distribution networks,[9] as well as various Internet service and infrastructure providers including:[10] Comcast, Google, Yahoo, Facebook, Yandex[11] YouTube, Akamai Technologies, Limelight Networks, Microsoft, Vonage, AOL, Mapquest, T-Online, Cisco, Juniper Networks, Huawei, the US Department of Commerce, MasterCard, the BBC, and Telmex. Major carriers measured the percentage of IPv6 traffic of all Internet traffic as increasing from 0.024 to 0.041 with respect to native and tunneled stacks combined.[12] Most IPv6 traffic in consumer access networks was to Google sites.[13] Demonstrating the need for content sites to adopt IPv6 for success, the biggest increase was actually in 6to4 transitional technologies.[13]Early results indicated that the day passed according to plan and without significant problems for the participants.[14] Cisco and Google reported no significant issues during the test.[15][16] Facebook called the results encouraging, and decided to leave their developer site IPv6-enabled as a result.[17] But the consensus was that more work needed to be done before IPv6 could consistently be applied